{"api_version":"1","generated_at":"2026-04-23T04:34:32+00:00","cve":"CVE-2023-23542","urls":{"html":"https://cve.report/CVE-2023-23542","api":"https://cve.report/api/cve/CVE-2023-23542.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-23542","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-23542"},"summary":{"title":"CVE-2023-23542","description":"A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to access user-sensitive data.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-05-08 20:15:00","updated_at":"2023-07-27 04:15:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://support.apple.com/en-us/HT213670","name":"https://support.apple.com/en-us/HT213670","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213677","name":"https://support.apple.com/en-us/HT213677","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.6.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213675","name":"https://support.apple.com/en-us/HT213675","refsource":"MISC","tags":[],"title":"About the security content of macOS Big Sur 11.7.5 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-23542","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23542","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"23542","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-23542","qid":"378188","title":"Apple macOS Big Sur 11.7.5 Not Installed (HT213675)"},{"cve":"CVE-2023-23542","qid":"378189","title":"Apple macOS Ventura 13.3 Not Installed (HT213670)"},{"cve":"CVE-2023-23542","qid":"378190","title":"Apple macOS Monterey 12.6.4 Not Installed (HT213677)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-23542","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to access user-sensitive data."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An app may be able to access user-sensitive data"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"13.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213670","refsource":"MISC","name":"https://support.apple.com/en-us/HT213670"},{"url":"https://support.apple.com/en-us/HT213677","refsource":"MISC","name":"https://support.apple.com/en-us/HT213677"},{"url":"https://support.apple.com/en-us/HT213675","refsource":"MISC","name":"https://support.apple.com/en-us/HT213675"}]}},"nvd":{"publishedDate":"2023-05-08 20:15:00","lastModifiedDate":"2023-07-27 04:15:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.6.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"11.7.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}